lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJiejCT8F18fH9yrtTDfHydFi6TDNdDWf8Ny7OATokf7EM-X1g@mail.gmail.com>
Date:	Tue, 6 Nov 2012 00:13:32 +0800
From:	Drunkard Zhang <gongfan193@...il.com>
To:	"Rafael J. Wysocki" <rjw@...k.pl>, cpufreq@...r.kernel.org,
	linux-pm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Auto reboot when CPU at full load with X86_ACPI_CPUFREQ

Resending to right lists :)

I'm using Intel Xeon X5570 x2 with Asus Z8PE-D18, and experiencing
auto reboot when CPU full loaded for minutes, like building kernel
with "make -j17". After a lot of bisecting of config file, I found the
option leads to the reboot: X86_ACPI_CPUFREQ, both configed
X86_ACPI_CPUFREQ as a module or built in will lead to reboot.

Config file finally bisected appended, config-3.7.0-rc3+-bad is the
one leads to reboot, config-3.7.0-rc3+-ok works OK. Hardware info also
appended.

I think it is a bug, anything I can do? When the bug triggered, the
screen blanked immediately, any advice for me to debug? Happy to match
to code :-)

This bug is CPU specific, with Xeon E5606 or E5620 it's all fine, just
triggered with Xeon X5570, or maybe all Xeon X serial.

Tested kernel version: 3.1.x, 3.3.x, 3.5.x, 3.6.x, 3.7*, they are all affected.

Download attachment "config-3.7.0-rc3+-bad" of type "application/octet-stream" (72177 bytes)

Download attachment "config-3.7.0-rc3+-ok" of type "application/octet-stream" (72147 bytes)

Download attachment "hardware-Asus_Z8PE-D18-Xeon5570" of type "application/octet-stream" (134386 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ